CVE-2020-16251
vault: GCP Auth Method Allows Authentication Bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
HashiCorp Vault y Vault Enterprise versiones 0.8.3 y posteriores, cuando son configuradas con el método de autenticación GCP GCE, pueden ser vulnerables a una omisión de autenticación. Corregido en las versiones 1.2.5, 1.3.8, 1.4.4 y 1.5.1
A flaw was found in Vault and Vault Enterprise (“Vault”). In affected versions of Vault, with the GCP Auth Method configured and under certain circumstances, the values relied upon by Vault to validate Google Compute Engine (GCE) VMs may be manipulated and bypass authentication.
HashiCorp Vault's GCP authentication method can be bypassed on gce type roles that do not specify bound_service_accounts. Vault does not enforce that the compute_engine data in a signed JWT token has any relationship to the service account that created the token. This makes it possible to impersonate arbitrary GCE instances, by creating a JWT token with a faked compute_engine struct, using an arbitrary attacker controlled service account.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-07-31 CVE Reserved
- 2020-08-26 CVE Published
- 2024-06-30 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/159479/Hashicorp-Vault-GCP-IAM-Integration-Authentication-Bypass.html | Third Party Advisory | |
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151 | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.hashicorp.com/blog/category/vault | 2023-08-29 | |
https://access.redhat.com/security/cve/CVE-2020-16251 | 2023-06-21 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2167340 | 2023-06-21 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 0.8.3 < 1.2.5 Search vendor "Hashicorp" for product "Vault" and version " >= 0.8.3 < 1.2.5" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.3.0 < 1.3.8 Search vendor "Hashicorp" for product "Vault" and version " >= 1.3.0 < 1.3.8" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.4.0 < 1.4.4 Search vendor "Hashicorp" for product "Vault" and version " >= 1.4.0 < 1.4.4" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.5.0 < 1.5.1 Search vendor "Hashicorp" for product "Vault" and version " >= 1.5.0 < 1.5.1" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 0.8.3 < 1.2.5 Search vendor "Hashicorp" for product "Vault" and version " >= 0.8.3 < 1.2.5" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.3.0 < 1.3.8 Search vendor "Hashicorp" for product "Vault" and version " >= 1.3.0 < 1.3.8" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.4.0 < 1.4.4 Search vendor "Hashicorp" for product "Vault" and version " >= 1.4.0 < 1.4.4" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.5.0 < 1.5.1 Search vendor "Hashicorp" for product "Vault" and version " >= 1.5.0 < 1.5.1" | - |
Affected
|